Total Economic Impact
Cost Savings And Business Benefits Enabled By ZTNA
A FORRESTER TOTAL ECONOMIC IMPACT STUDY COMMISSIONED BY AppGate, November 2025
Total Economic Impact
A FORRESTER TOTAL ECONOMIC IMPACT STUDY COMMISSIONED BY AppGate, November 2025
Organizations shift to decentralized, cloud-first environments to grow, innovate, and reduce costs. As they lean into modern cloud and AI technologies, they increasingly face sophisticated cyberthreats from these same opportunities. Firms must ensure secure, compliant Zero Trust network access (ZTNA) across hybrid infrastructures without relying on legacy perimeter-based models. Modern infrastructure built on secure and resilient network access helps organizations reduce risk, simplify identity and entitlement management, and adapt to dynamic threat landscapes.1
AppGate ZTNA delivers a secure, purpose-built ZTNA solution that enables organizations to protect critical resources and achieve measurable business outcomes that are often left unserved by multifunction or cloud-routed platforms. Its low-latency, contextual access for explicit authorization creates direct, encrypted connections between users and resources. With a software-defined perimeter and the use of single-packet authorization (SPA), AppGate ZTNA confers unique cloaking and network obfuscation capabilities, avoids vendor-controlled cloud routing, and minimizes exposure to shared infrastructure risks. Its Zero Trust architecture, distributed enforcement model, and API-first design streamlines network complexity; enables scalable, resilient access across hybrid environments; reduces attack surfaces; and supports automation, integration, and dynamic policy control.
AppGate commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying ZTNAA and to demonstrate the value of choosing a vendor that is exclusively focused on secure access.2 The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of ZTNA on their organizations.
To better understand the benefits, costs, and risks associated with this investment, Forrester interviewed four decision-makers with experience using AppGate ZTNA. For the purposes of this study, Forrester aggregated the experiences of the interviewees and combined the results into a single composite organization that is a multibillion-dollar, globally distributed organization with advanced workloads, including agentic AI.
Interviewees said that prior to using ZTNA, their organizations struggled to maintain costly, hardware-laden network architectures. Their organizations previously faced frequent disruptions and security risks due to complex routing environments and legacy access models, while managing secure access often demanded significant manual effort from dedicated resources. Downtime resulted in measurable efficiency losses while scaling limitations hindered business growth.
After their investment in AppGate ZTNA, interviewees reported that their organizations reduced the potential impact of insider and other internal threats by putting into practice foundational principles of least-privilege, separation of duties, and segmentation. These efforts improved their security and compliance posture, even when scaling protection across large numbers of users. The solution’s ease of use and responsiveness enabled the interviewees’ smaller teams to maintain large technology estates more efficiently than their prior environments. This increased end-user productivity and lowered labor costs while ensuring a resilient security and compliance posture across highly distributed, hybrid, and mobile scenarios.
Quantified benefits. Three-year, risk-adjusted present value (PV) quantified benefits for the composite organization include:
A 50% reduction in networking technology and management costs. With AppGate ZTNA, the composite organization eliminates routing inefficiencies, reduces hardware dependency, and decommissions unnecessary software and SaaS solutions. This optimized network infrastructure leverages an approach that lowers capital expenses and simplifies administration for total network infrastructure and management cost savings of $4.2 million.
A 75% improvement in end-user productivity. With AppGate ZTNA, the composite supports high-performance secure access at scale. It enables direct, encrypted tunnels between users and resources on demand, reducing latency and complexity. This streamlines the remote-user experience and reduces the amount of time users spend onboarding and seeking support for user issues, helping the composite increase end-user productivity by $4.1 million.
An 80% reduction in exposure to costly data breaches. The composite organization strengthens its cyber defenses with AppGate ZTNA in part by making networks invisible to unauthorized users and automatically adjusting access based on device compliance and risk posture. By delivering secure, adaptive access across diverse and constantly changing environments with AppGate ZTNA, the composite organization reduces its exposure to costly data breaches by $3.1 million.
An 80% increase in uptime hours from improved network availability and resilience. With AppGate ZTNA’s modular architecture and controller-based failover, the composite organization minimizes downtime disruption, keeping infrastructure operating more smoothly with higher availability for more remote users. As a result of the improved availability and resilience, the composite saves $955,000.
A 50% reduction in effort needed to secure and scale network access across environments. With AppGate ZTNA, the composite organization automates onboarding and provisioning workflows, streamlines policy and entitlement management, and reduces labor effort for security and operations (SecOps), NetOps, infrastructure, and user management. The cumulative labor savings for IT resources amount to $1.7 million over three years.
A 90% increase in speed for time to revenue opening and integrating new sites. Due to the on-demand AppGate ZTNA’s direct-routed architecture, the composite organization shortens previously lengthy planning hardware procurement cycles and resource-intensive infrastructure deployments when opening new sites. AppGate’s flexible, API-first architecture provides IT teams with full programmability to automate, integrate, and scale new sites. This improved agility and enhanced scalability helps the composite organization improve profit by over $3.0 million over the investment period when compared to the prior environment.
Unquantified benefits. Benefits that provide value for the composite organization but are not quantified for this study include:
Improved regulatory compliance and cybersecurity insurance posture. AppGate ZTNA strengthens compliance and cybersecurity insurance posture for the composite by providing flexible, software-defined controls, detailed access visibility, and dynamic tunneling capabilities that supports evolving regulatory needs and improves cyber risk management.
Improved product quality. AppGate ZTNA improves the composite’s product quality by enabling developers to maintain uninterrupted, secure access to their work environments, allowing faster task completion and a more responsive development cycle.
Increased remote work-related benefits. AppGate ZTNA enables secure remote work at scale for the composite by allowing employees to access critical systems from any location while maintaining strong access controls, improving workforce flexibility without compromising security.
Costs. Three-year, risk-adjusted PV costs for the composite organization include:
AppGate ZTNA. The composite organization supports 25,000 users per month for total AppGate ZTNA costs of $5.5 million over the investment period.
Deployment and management. The composite organization dedicates 240 IT resource hours within a five-week period to stand up its AppGate ZTNA environment. It requires approximately one-tenth of one FTE to manage the AppGate ZTNA environment. Deployment and management costs total $58,000 for the composite.
The financial analysis that is based on the interviews found that a composite organization experiences benefits of $17.1 million over three years versus costs of $5.5 million, adding up to a net present value (NPV) of $11.6 million and an ROI of 210%.
Productive end-user hours recaptured over three years
Return on investment (ROI)
Benefits PV
Net present value (NPV)
Payback
| Role | Industry | Region | Number Of Users |
|---|---|---|---|
| Network manager | Technology services | Mostly US | >100,000 |
| Network security architect | Technology | Global | 5,000 to 10,000 |
| Cybersecurity manager | Manufacturing | Global | 10,000 to 20,000 |
| Head of information security | Financial services | US | <500 |
Prior to their investment in AppGate ZTNA, interviewees described how their organizations struggled to deliver secure access to core network resources. Whether their organizations were coming from remote-access environment secured by a traditional VPN solution or by a more modern, cloud-routed networking solution, interviewees lamented IT labor inefficiencies, inherent security risks, and rigid, overly permissive access models.
Interviewees noted how their organizations struggled with common challenges, including:
Network infrastructure and management complexity and inefficiency. Interviewees said their organizations previously faced several network and infrastructure challenges, including limited granularity in access control, which restricted the ability to tailor user privileges effectively. Their VPN environments were fragmented and complex, with multiple overlapping configurations and inconsistent IP access across teams. Data residency requirements further constrained flexibility by mandating on-premises storage in specific regions. Legacy multiprotocol label switching (MPLS) architectures added to operational complexity and overhead for the interviewees’ organizations, who also operated under tight budget constraints.
Costly risks of a cyber breach security. Interviewees said their organizations previously struggled with overly permissive legacy VPN environments that lacked granular access controls, making them vulnerable to threats such as brute force, DDoS, and ransomware attacks. Their infrastructure was difficult to manage, with overlapping routes, outdated software versions, and long maintenance windows that hindered timely updates and increased operational risk. Data residency requirements and fragmented access policies further complicated network design. Additionally, reliance on shared cloud platforms introduced concerns around availability and continuity, especially during major outages.
The network security architect in the technology industry shared: “[The network] was too open, allowed too much excess, and then patching, adding the additional sites, introducing or injecting routes that could overlap or now route others, requiring lots of planning and huge downtime and maintenance windows. It was difficult to sell to the business, so a lot of it never happened.”
Poor availability of key network services. The interviewees’ organizations previously encountered significant network and performance challenges that disrupted developer workflows and remote user experiences. Development was often constrained to local machines or exposed to public networks, raising privacy concerns. VPN configurations lacked split tunneling and sufficient bandwidth, leading to performance degradation and congestion at data centers. Interviewees said remote desktop users experienced latency issues such as delayed input and screen freezes, which impacted productivity and reliability.
The cybersecurity manager in the manufacturing industry stated: “[Our network] was suffering under the weight of being a nonsplit tunneled policy. It was a full tunnel and VPN devices were not connected to sufficient bandwidth to support the user load, so we had performance complaints. Then, we also had issues where too many people on VPN would start to impact business traffic at those data centers, so it was a struggle, and we only had about 400 remote VPN workers at that time.”
Inefficient, manual technical operations in SecOps, NetOps, and user management. Interviewees reported that their organizations previously operated under strained and reactive network environments, where legacy VPN systems required extensive manual provisioning and round-the-clock support across multiple gateways. Their infrastructure was resource-intensive, with large teams dedicated to maintaining outdated systems, leaving little room for innovation or strategic upgrades. Operational efforts at the interviewees’ organizations were focused on patching issues and maintaining stability, often at the expense of forward-looking initiatives. This constant firefighting created a sense of fragility and limited the ability to pursue next-generation solutions.
The network manager in the technology services industry said that their organization faced so much complexity that it was unable to consolidate down to a single VPN in the prior environment, leading to significant labor redundancies and troubleshooting efforts. They said: “We had around 30 resources supporting just these two VPNs. We had multiple gateways that needed [multilayered] support 24/7, and provisioning was not automated. We had to do a lot of manual provisioning.”
Limited business agility. The interviewees’ organizations previously faced significant challenges during mergers and acquisitions due to complex network integration issues making necessary upgrades risky and impractical due to legacy systems and limited operational knowledge. Technical teams were typically brought in post-acquisition without dedicated onboarding processes, forcing them to devise custom solutions under pressure. Connectivity delays at the interviewees’ organizations were exacerbated by reliance on private hardware-dependent networking models that required long lead times, further slowing integration and operational readiness.
The cybersecurity manager in the manufacturing industry stated: “Because our connectivity model was private MPLS, we had a minimum 90-day lead time to order one of those circuits. [Then] we would need an address to install it at, so we could get connectivity there eventually, but it took six months to get a circuit in there to actually connect directly to the private network.”
Impediments to end-user productivity. Interviewees said their organizations previously dealt with fragmented VPN environments that required users to manually switch between multiple gateways based on application location, leading to confusion and inefficiency. This setup created a poor user experience for their users, interrupted workflows, and often required full reconnection cycles.
The network manager in the technology services industry said: “If someone is developing something, they want uninterrupted connection. [In our prior legacy] developer environment, the developers connected to a jump server, and from there they connected to their environment. So if they lost connectivity to the jump server, they needed to [start over and] reconnect from the beginning.”
The interviewees explained how their prior organizational limitations collectively drove the need for more secure, scalable, and manageable solutions like Zero Trust network access and performance-optimized infrastructure to support modern work environments. These challenges highlighted the need for a more seamless, automated, and resilient access model to support both end-user productivity and technical operations.
Interviewees indicated that their organizations invested in AppGate ZNTA in part due to its flexibility, protocol support, and scalability. Unlike other tools that were designed primarily for web and SaaS applications, the interviewees appreciated that AppGate ZTNA closed gaps in coverage for traditional IP-based protocols and legacy systems.
The interviewees’ organizations integrated AppGate ZTNA across hybrid environments to automate and modernize their approach to secure access. Interviewees shared how they leveraged AppGate ZTNA to enable their organizations’ rapid shift to remote work. Taking advantage of its easy-to-implement split tunneling policies, the interviewees’ organizations sought to streamline and improve the remote user experience by increasing performance and connection speeds while introducing improved, granular access policies.
The cybersecurity manager in the manufacturing industry stated: “We have 159 policies [with AppGate ]. When we were [in the legacy environment], we had one single policy: you connect, you get access to the entire network. It was a wide-open, full-tunnel situation.”
Based on the interviews, Forrester constructed a TEI framework, a composite company, and an ROI analysis that illustrates the areas financially affected. The composite organization is representative of the interviewees’ organizations, and it is used to present the aggregate financial analysis in the next section. The composite organization has the following characteristics:
Description of composite. The composite organization is a globally distributed technical organization with advanced workloads including agentic AI. Of its 25,000 total FTE users, 60% require secure remote access to network resources. The composite is subject to several compliance regimes and is growing both organically and through mergers and acquisitions at a rate of two companies or sites integrated each year.
Deployment characteristics. The functions of network operations, security operations, infrastructure management, and user management are distributed across the IT team, equating to 12 FTEs. The composite organization replaces its cloud-based or traditional VPN and hardware-driven network infrastructure with AppGate ZTNA to public, private, self-hosted workloads and sensitive data across its 40 sites in five weeks. It onboards all 300 corporate applications and 50,000 devices in that timeframe.
$5 billion in annual revenue
25,000 total FTE users, 60% of whom require secure remote access
12 FTEs on IT team covering networking, security, infrastructure, and user management
11% operating margin
| Ref. | Benefit | Year 1 | Year 2 | Year 3 | Total | Present Value |
|---|---|---|---|---|---|---|
| Atr | Optimized network infrastructure and management | $1,686,112 | $1,686,112 | $1,686,112 | $5,058,336 | $4,193,111 |
| Btr | Improved end-user productivity | $1,657,500 | $1,657,500 | $1,657,500 | $4,972,500 | $4,121,957 |
| Ctr | Strengthened security | $1,249,372 | $1,249,372 | $1,249,372 | $3,748,116 | $3,107,004 |
| Dtr | Improved availability and resilience | $384,000 | $384,000 | $384,000 | $1,152,000 | $954,951 |
| Etr | Improved IT technical operations | $688,896 | $688,896 | $688,896 | $2,066,688 | $1,713,182 |
| Ftr | Improved agility | $1,218,461 | $1,218,461 | $1,218,461 | $3,655,382 | $3,030,132 |
| Total benefits (risk-adjusted) | $6,884,341 | $6,884,341 | $6,884,341 | $20,653,023 | $17,120,337 |
Evidence and data. Interviewees’ organizations previously faced high network costs and operational complexity due to reliance on perimeter-based security, legacy VPNs, and hardware-intensive infrastructure. The shift to AppGate’s software-defined solutions helped reduce interviewees’ organizations infrastructure costs while simplifying administration. Interviewees emphasized how AppGate ZTNA helped their organizations:
Reduce network infrastructure cost and complexity. Interviewees described how their organizations simplified network architecture by eliminating unnecessary infrastructure, hardware, software, and SaaS solutions while also eliminating routing inefficiencies and associated operational costs.
Streamline networking administration costs. Interviewees also noted how their AppGate environments streamlined network administration across distributed environments with fewer FTEs required for networking infrastructure technology management compared to legacy VPNs and modern, cloud-routed solutions.
Modeling and assumptions. Based on the interviews, Forrester assumes the following about the composite organization:
The composite organization’s networking infrastructure costs totaled $4 million in the prior environment.
The composite organization’s legacy networking infrastructure required 1.5 FTEs to manage in the prior environment.
The average fully burdened annual salary for a technical resource is $143,520.
AppGate ZTNA lowers networking infrastructure technology and management costs by 50% through eliminating routing inefficiencies and unnecessary infrastructure, hardware, software, and SaaS solutions while preventing further associated operational costs.
Risks. The following risks may impact this benefit:
The number of remote-access users.
The number of legacy tools and internal labor effort needed to manage them.
Required capabilities and existing contractual terms.
Prevailing labor rates and the skill sets available.
Results. To account for these risks, Forrester adjusted this benefit downward by 20%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $4.2 million.
Technology management labor effort reallocated to higher-value activities
| Ref. | Metric | Source | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|
| A1 | Networking infrastructure costs in the prior environment | Composite | $4,000,000 | $4,000,000 | $4,000,000 | |
| A2 | FTEs required for networking infrastructure technology management in the prior environment | Composite | 1.5 | 1.5 | 1.5 | |
| A3 | Fully burdened annual salary for a technical resource | Composite | $143,520 | $143,520 | $143,520 | |
| A4 | Percentage reduction in networking infrastructure technology and management costs with AppGate | Interviews | 50% | 50% | 50% | |
| At | Optimized network infrastructure and management | (A1*A4)+(A2*A3*A4) | $2,107,640 | $2,107,640 | $2,107,640 | |
| Risk adjustment | ↓20% | |||||
| Atr | Optimized network infrastructure and management (risk-adjusted) | $1,686,112 | $1,686,112 | $1,686,112 | ||
| Three-year total: $5,058,336 | Three-year present value: $4,193,111 | |||||
Evidence and data. Interviewees discussed how AppGate ZTNA made it easier for their users to get onboarded and productive quickly and consistently, giving them secure and consistent access to the tools they need without frustrating delays or performance issues.
Faster, more performant and resilient connectivity. Interviewees said that AppGate ZTNA delivered faster, more resilient, and secure connectivity for their organizations by enabling direct, encrypted tunnels between users and resources, reducing latency, and supporting high-performance secure access at scale.
Quicker user onboarding with fewer troubleshooting issues. Interviewees reported that their organizations’ users experienced up to 70% faster onboarding with AppGate ZTNA with fewer access issues and reduced failure rates.
Modeling and assumptions. Based on the interviews, Forrester assumes the following about the composite organization:
Sixty percent, or 15,000 of the composite organization’s users require secure remote access to core network resources.
In the prior environment, remote desktop users experienced additional login steps, slower connection speeds, high latency, frequent session reboots, and other productivity impediments, causing each remote user to waste an average of 4 minutes per day on secure access issues.
With AppGate ZTNA, the composite can support high-performance secure access at scale. It enables direct, encrypted tunnels between users and resources on demand, reducing latency and complexity. This streamlines the remote user experience and reduces the amount of time users spend onboarding and seeking support for user issues, helping the composite reduce the amount of time users waste on remote desktop issues by 75%.
The fully burdened hourly rate for an end user is $40.
End users recapture 25% of the hours that would have otherwise been lost to lengthy remote desktop procedures.
Risks. The following risks may impact this benefit:
The performance of an organization’s legacy VPN solution.
The size of organization, employee base, and breadth of AppGate ZTNA adoption.
Prevailing labor rates and each user’s ability to recapture time savings toward productive activities.
Results. To account for these risks, Forrester adjusted this benefit downward by 15%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $4.1 million.
Productive hours recaptured for remote end users over three years
| Ref. | Metric | Source | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|
| B1 | Total users requiring remote access | Composite | 15,000 | 15,000 | 15,000 | |
| B2 | Time per day spent loading remote desktop in the prior environment (minutes) | Composite | 4 | 4 | 4 | |
| B3 | Percentage reduction in time to load a remote desktop with AppGate | Interviews | 75% | 75% | 75% | |
| B4 | Fully burdened hourly rate for an end user | Composite | $40 | $40 | $40 | |
| B5 | Productivity recapture | TEI methodology | 25% | 25% | 25% | |
| Bt | Improved end-user productivity | (B1*B2*B3*B4*B5*260)/60 | $1,950,000 | $1,950,000 | $1,950,000 | |
| Risk adjustment | ↓15% | |||||
| Btr | Improved end-user productivity (risk-adjusted) | $1,657,500 | $1,657,500 | $1,657,500 | ||
| Three-year total: $4,972,500 | Three-year present value: $4,121,957 | |||||
Evidence and data. Interviewees shared how their organizations’ investments in AppGate ZTNA helped address significant security challenges in the prior environment that stemmed from broad network access, limited policy granularity, and legacy VPN architectures that exposed infrastructure to unnecessary risk. The shift to a Zero Trust model with dynamic, identity-based policies, cloaked infrastructure, continuous risk assessment, and just-enough-access (JEA) with AppGate ZTNA offered the following benefits:
Delivered resilient security across complex environments. The interviewees shared how AppGate ZTNA’s direct-routed architecture established encrypted, point-to-point connections between their organizations’ users and resources. This design eliminated centralized traffic bottlenecks and reduced exposure to intermediary infrastructure, ensuring consistent security enforcement occurred locally regardless of user location or device type. By maintaining persistent identity verification and dynamic policy evaluation, interviewees noted that AppGate helped prevent unauthorized access and limited the opportunity for attackers to exploit shifting network conditions.
The cybersecurity manager in the manufacturing industry stated: “The cloaked infrastructure is also another really cool piece of AppGate because [the] infrastructure is invisible to the internet unless you know the right secret code to get in. … We don’t have to worry [as much about our] gateways getting attacked because nobody knows they’re there. It’s unique [to AppGate]. I’ve yet to experience another solution that does it that way.”
Improved monitoring capabilities with more precise access controls. Interviewees’ organizations enhanced their access control by replacing legacy VPNs with AppGate’s identity-centric, policy-driven architecture. Instead of broad network access, users were granted least-privilege access to only the specific resources they needed, down to individual IP addresses and ports. Interviewees said that access policies were continuously evaluated every 15 minutes, allowing for real-time enforcement based on user status, device posture, and risk scores. This dynamic monitoring meant that if a user’s account was disabled or their device became noncompliant (e.g., missing antivirus or outdated patches), access was automatically revoked without manual intervention. These capabilities extended to third-party users and contractors, who were given highly restricted access, minimizing exposure and risk.
The cybersecurity manager in the manufacturing industry stated: “The user simply can’t laterally move anymore unless I have a policy that says they can. They can’t scan the network, so if an attacker were to try to get into my AppGate, they would have to get through multifactor first, and even then, they’re going to be stuck with an access policy that’s based on that user. They’re not going to be able to sweep the network. They’re not going to be able to do discovery. They’re not going to be able to do enumeration, so yeah, it does a lot.”
Reduced attack surface and breach impact radius. Interviewees appreciated AppGate’s support for private IP provisioning, which eliminated the need for publicly exposed endpoints while reducing complexity and risk of misconfiguration. They also described how AppGate significantly reduced their organizations’ attack surfaces, including by cloaking their organizations’ network infrastructures and enforcing microsegmentation. Most network appliances became invisible to unauthorized users through techniques like single packet authorization (SPA), making it nearly impossible for attackers to scan or enumerate the environment. Interviewees further noted that their internal organizational systems, including sensitive “crown jewel” assets, were placed behind additional AppGate gateways, requiring explicit policy-based access even from within the corporate network. This approach blocked lateral movement and ensured that attackers could not explore or exploit the network beyond their limited entitlements,
even if they had compromised credentials.
Modeling and assumptions. Based on the interviews, Forrester assumes the following about the composite organization:
The cumulative cost of breaches for the composite totaled nearly $3.6 million per year in the prior environment.3
The composite has a 68% likelihood of experiencing one or more breaches.4
Eighty percent of breaches targeting the composite organization originate from external attacks with high potential for lateral movement.5
With AppGate ZTNA, the composite organization tightens network access with expanded policy granularity and decommissions legacy VPN architectures that exposed infrastructure to unnecessary risk. As a result, the composite organization gains the native ability to enforce contextual access control and apply segmentation, reducing infrastructure risk inherent in the prior environment. This minimizes the composite’s exposure to breach costs from addressable attacks by 80%.
Risks. The following risks may impact this benefit:
The size and industry of the organization, which can impact the likelihood and associated costs of security breaches annually.
An organization’s legacy security capabilities and level of AppGate ZTNA coverage and adoption.
Results. To account for these risks, Forrester adjusted this benefit downward by 20%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $3.1 million.
Reduced risk of exposure to breach costs from addressable attacks with AppGate
| Ref. | Metric | Source | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|
| C1 | Cumulative cost of breaches for the composite | Forrester research | $3,588,500 | $3,588,500 | $3,588,500 | |
| C2 | Likelihood of experiencing one or more breaches for the composite | Forrester research | 68% | 68% | 68% | |
| C3 | Percentage of breaches originating from external attacks targeting organizations, internal incidents, attacks or incidents involving the external ecosystem | Forrester research | 80% | 80% | 80% | |
| C4 | Annual risk exposure addressable with AppGate | C1*C2*C3 | $1,952,144 | $1,952,144 | $1,952,144 | |
| C5 | Reduced risk of exposure to breach costs from addressable attacks with AppGate | Interviews | 80% | 80% | 80% | |
| Ct | Strengthened security | C4*C5 | $1,561,715 | $1,561,715 | $1,561,715 | |
| Risk adjustment | ↓20% | |||||
| Ctr | Strengthened security (risk-adjusted) | $1,249,372 | $1,249,372 | $1,249,372 | ||
| Three-year total: $3,748,116 | Three-year present value: $3,107,004 | |||||
Evidence and data. Interviewees reported that their organizations’ shift to cloaked infrastructure and dynamic, user-specific routing significantly reduced disruption risk, regardless of user location, device characteristics, and access requirements. Correspondingly, their investments in AppGate ZNTA resulted in improved uptime, speed, and performance.
The network security architect in the technology industry noted that AppGate’s cloaked infrastructure helped improve network performance while also strengthening security: “With AppGate ZTNA, you don’t have to deny traffic — the network just doesn’t exist if you don’t qualify for it, so everything is dark unless you qualify to get access. ... You can represent with a VPN solution to an extent but the fact that [with AppGate], in real time, your machine could become uncompliant based on some foreign effect and then your access would automatically be reduced based on your risk score. That was phenomenal, a game changer.”
The network manager in the technology services industry said that AppGate ZTNA made it easier to maintain more up-to-date versions, mitigating disruption both during the patching process and through improved uptime for everyday operations: “When a new version is released, we test that in the development platform and then deploy to the production environment, and it just happens. We do that every six months. [Before AppGate], we had to do more upgrades [than we actually] could because [in] the complex [legacy] environment … had outages [when we tried]. Now it’s a smooth process because we can just do it one controller at a time so there is no impact for the end users. [T]here are fewer major incidents. … It’s designed in such a way that we have backups across countries or regions, so the outages are very minimal, and end users are also very happy.”
The cybersecurity manager in the manufacturing industry stated: “Under the old model, we were struggling to get 300 people connected simultaneously. On AppGate [now], I routinely have [up to] 5,000. ... [Prior to AppGate], we were spending 30 to 40 hours a month troubleshooting [legacy] VPN problem, mainly around bandwidth and performance. Ultimately, not being able to solve it was the biggest reason … why we jumped over to AppGate and just went full steam with it. The performance at those sites where the VPN headends were got much better after AppGate was deployed because we took the load off of them of having to support all the VPN users.”
Modeling and assumptions. Based on the interviews, Forrester assumes the following about the composite organization:
The composite organization has 15,000 users requiring secure remote access to network resources.
In the prior environment, the composite organization’s legacy VPN experienced 1 hour of downtime per month due to outages and severe performance degradations.
With AppGate ZTNA, the composite organization decommissions its legacy VPN, eliminates routing inefficiencies, and increases the number of high-performance users it can support. As a result, it reduces the total annual hours of downtime due to VPN outages by 80%.
The fully burdened hourly rate for an end user is $40.
Risks. The following risks may impact this benefit:
Organizational size, geography, industry, and revenue mix.
Average availability and performance in legacy environments.
Prevailing labor rates.
Results. To account for these risks, Forrester adjusted this benefit downward by 20%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $955,000.
Increase in uptime hours from improved secure access availability and resilience
| Ref. | Metric | Source | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|
| D1 | Total users requiring secure access | Composite | 15,000 | 15,000 | 15,000 | |
| D2 | Downtime per month for remote users due to VPN outages in the prior environment (hours) | Composite | 1.0 | 1.0 | 1.0 | |
| D3 | Percentage reduction in hours of downtime due to VPN outages with AppGate | Interviews | 80% | 80% | 80% | |
| D4 | Fully burdened hourly rate for an end user | Composite | $40 | $40 | $40 | |
| Dt | Improved availability and resilience | D1*D2*D3*D4 | $480,000 | $480,000 | $480,000 | |
| Risk adjustment | ↓20% | |||||
| Dtr | Improved availability and resilience (risk-adjusted) | $384,000 | $384,000 | $384,000 | ||
| Three-year total: $1,152,000 | Three-year present value: $954,951 | |||||
Evidence and data. Interviewees highlighted many ways in which AppGate ZTNA improved IT workflows for security, infrastructure, and network operational teams, as well as provided efficiencies for user and access management teams. Interviewees described how this eliminated manual onboarding processes, decreased ticket volumes, and improved the ability to segment critical assets without increasing risk or administrative burden. This helped the interviewees’ organizations deploy smaller teams to support more agile and cost-effective IT operations. In particular, interviewee shared how AppGate ZTNA:
Enhanced networking and infrastructure operations. Interviewees reported that their organizations’ transition to automated workflows with AppGate ZTNA helped automate workflows related to networking and microsegmentation.
Improved security operational efficiency across hybrid environments. Interviewees shared how AppGate ZTNA platform’s flexibility allowed security teams to maintain consistent policies across diverse environments, improving agility while strengthening overall security posture.
The cybersecurity manager in the manufacturing industry stated: “Different use cases have different requirements, so we have close to 600 different applications [requiring secure access policies] plus 50 to 60 vendors, each of them connecting to maybe one or two servers each. … [Without AppGate, I] would probably need to double the team. We couldn’t do it with a six-person security team for 12,000 employees. It’s just too much, there’s just too much to do.”
Streamlined identity and access management workflows. Interviewees reported many ways in which AppGate ZTNA helped IT resources enable fast, secure access in dynamic environments. They noted how policies were very dynamic in nature, making it easier for their teams to rapidly adjust and easily update policies as well once they were created.
The head of information security in the financial services industry shared how their organization used AppGate ZTNA to manage entitlements: “Entitlements are easy to create with or without Application Discovery Service. Application Discovery Service helps you do it at scale but just even creating entitlements [was] something that would take maybe anywhere from like 4 to 8 or more labor hours for a senior or higher network architect [before AppGate ZTNA]. Now, I can have any one of our engineers easily work on it [and] deploy in 15 minutes or so to make a major policy change versus a day [in the prior environment].”
Reduced ticket volumes and streamlined secure access troubleshooting. Interviewees reported many ways in which AppGate ZTNA helped IT resources enable fast, secure access compared to the prior environment.
The network manager in the technology services industry also explained: “The volume has reduced drastically. … I see daily volume of around 15 tickets and in the past it was probably around 70 tickets per day. … In the past, because the volume of tickets was higher, we were taking around on an average 8 hours for a ticket reservation on an average. But now the SLA is less than 4 hours.”
Modeling and assumptions. Based on the interviews, Forrester assumes the following about the composite organization:
In the prior environment, the composite organization dedicated approximately 25,000 labor hours, or the equivalent of 12 IT resources, to technical workflows related to security, networking, infrastructure, and user and access management.
With AppGate, the composite organization automates workflows across the onboarding and provisioning lifecycle, manages policies and entitlements more easily and consistently across diverse environments, and integrates with key third-party security and identity solutions. This reduces the labor effort needed to secure remote network access at scale by 50%.
The fully burdened hourly rate for a technical resource is $69.
Risks. The following risks may impact this benefit:
The number of users.
The size of the IT team covering SecOps, NetOps, infrastructure, and user management.
Legacy processes and solutions required to add, secure, and manage users and networking infrastructure in the prior environment.
Prevailing labor rates, the skill sets available, and the extent to which IT resources can recapture time savings toward productive work.
Results. To account for these risks, Forrester adjusted this benefit downward by 20%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $1.7 million.
Reduction in technical resources required to achieve ZTNA with AppGate
| Ref. | Metric | Source | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|
| E1 | Internal technical resource time needed to achieve ZTNA in the prior environment (hours) | Composite | 24,960 | 24,960 | 24,960 | |
| E2 | Percentage reduction in technical resources required to achieve ZTNA with AppGate | Interviews | 50% | 50% | 50% | |
| E3 | Fully burdened hourly rate for a technical resource | Composite | $69 | $69 | $69 | |
| Et | Improved IT technical operations | E1*E2*E3 | $861,120 | $861,120 | $861,120 | |
| Risk adjustment | ↓20% | |||||
| Etr | Improved IT technical operations (risk-adjusted) | $688,896 | $688,896 | $688,896 | ||
| Three-year total: $2,066,688 | Three-year present value: $1,713,182 | |||||
Evidence and data. Interviewees discussed how the shift to dynamic, software-defined network access with AppGate ZTNA enabled rapid gateway deployment and accelerated business operations. Customer-reported value drivers for this newfound business agility included:
Shortened planning cycles with fewer requirements. Some interviewees described how their legacy, hardware-driven network architecture required months of coordination, hardware procurement, and manual configuration. With AppGate ZTNA, they described how their organizations were able decrease time to market with less resource planning and capital expenditure planning required to integrate newly acquired companies into their parent structure or to set up new offices or data centers.
Accelerated integration and deployment workflows. With AppGate, interviewees indicated that their organizations were able to deploy infrastructure rapidly. Some noted that their organizations transformed their rigid legacy access models and onboarding processes to be more flexible and were able to quickly adapt to changing business needs. This allowed them to onboard thousands of users within days with minimal internal resources during periods of high M&A growth.
The cybersecurity manager in the manufacturing industry stated: “[AppGate ZTNA] speeds up the time to integrate, which just speeds up everything. It speeds up the ability to [achieve] synergies and cost [savings] and collaboration. Everything moves faster when everybody has access to what they need when they need it. [The business user] is never frustrated by waiting on security [because] they don’t have to wait.”
Modeling and assumptions. Based on the interviews, Forrester assumes the following about the composite organization:
In the prior environment, the composite organization:
With AppGate ZTNA, the composite organization avoids lengthy planning hardware procurement cycles when opening new sites due to the on-demand nature of AppGate infrastructure provisioning. The flexible, API-first architecture empowers IT teams with full programmability to automate, integrate, and scale new sites. This reduces the integration timeline and increases time to revenue by 90%.
The composite organization’s operating margin is 11%.
Risks. The following risks may impact this benefit:
The number of users.
The number of companies acquired and/or new sites opened throughout the investment period.
Legacy processes required to absorb a new company and/or open a new site in the prior environment.
Prevailing labor rates and the skill sets available.
Results. To account for these risks, Forrester adjusted this benefit downward by 20%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $3.0 million.
Reduction in time to integrate an acquired company and/or open a new site with AppGate ZTNA
| Ref. | Metric | Source | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|
| F1 | Revenue from acquisitions | Composite | $50,000,000 | $50,000,000 | $50,000,000 | |
| F2 | Revenue per acquisition per week | F1/52 | $961,538 | $961,538 | $961,538 | |
| F3 | Acquisitions per year | Composite | 2 | 2 | 2 | |
| F4 | Time to integrate an acquired company in the prior environment (weeks) | Composite | 8 | 8 | 8 | |
| F5 | Reduction in time to integrate an acquired company with AppGate | Interviews | 90% | 90% | 90% | |
| F6 | Operating margin | Composite | 11% | 11% | 11% | |
| Ft | Improved agility | F2*F3*F4*F5*F6 | $1,523,076 | $1,523,076 | $1,523,076 | |
| Risk adjustment | ↓20% | |||||
| Ftr | Improved agility (risk-adjusted) | $1,218,461 | $1,218,461 | $1,218,461 | ||
| Three-year total: $3,655,382 | Three-year present value: $3,030,132 | |||||
Interviewees mentioned the following additional benefits that their organizations experienced but were not quantified for this study:
Improved regulatory compliance and cybersecurity insurance posture. Interviewees shared how AppGate supported their organizations in navigating evolving regulatory demands by offering flexible security controls, detailed access reporting, and continuous visibility. They noted how this strengthened their organizations’ compliance efforts while also improving cyber insurance outcomes.
Improved product quality. Some interviewees shared how AppGate helped improve product quality by ensuring developers stayed securely connected to their work environments without interruption, allowing them to focus on tasks and complete them more efficiently. As a result, they noted that their software development lifecycle was shorter and more responsive to customer feedback.
The cybersecurity manager in the manufacturing industry stated: “They don’t have to worry about getting access to what they need because AppGate will provide that access when they need it … and I think that enables the business to move faster just in general. Safety is obviously number one but then running fast and doing things quickly is also key. On the secure access side of things, we’re never the bottleneck. We can get you access as fast as you need it. You’re not going to be waiting on AppGate to get anything done. The moment you ask, it’s going to happen, and it’s going to work the first time. It just enables the business to run at the speed that they need to do great things.”
Increased remote work-related benefits. AppGate enabled secure remote work at scale by allowing employees at the interviewees’ organizations to access systems from any location, which improved hiring flexibility, supported workforce mobility, and ensured compliance with location-based access restrictions.
The value of flexibility is unique to each customer. There are multiple scenarios in which a customer might implement ZTNA and later realize additional uses and business opportunities, including:
Cloud transformation enablement. Interviewees also discussed how they leveraged AppGate’s flexible deployment capabilities to support cloud transformation across global sites. Even in environments with legacy infrastructure and limited historical documentation, AppGate facilitated smooth transitions and modernization efforts.
The cybersecurity manager in the manufacturing stated that AppGate was a critical part of their organization’s cloud transformation strategy due to its extensibility into private cloud infrastructures located in other geographical regions and ability to deploy gateways closer to users and their workloads.
Integrations. Interviewees shared how their organizations integrated AppGate ZTNA seamlessly into their evolving technology stacks with identity and endpoint security platforms to enforce conditional access policies at the network layer, enhancing compliance, reducing risk, and improving overall security posture through real-time device and user validation.
The head of information security in the financial services industry said that their organization integrated AppGate with Microsoft Entra ID to enforce conditional access policies at the network layer, creating a tightly coordinated system of identity, device compliance, and Zero Trust network controls: “[We like] its ability to be interoperable with other best of breed [solutions] like CrowdStrike… [And] one of the things that AppGate does really well is it pulls in Entra ID, Microsoft telemetry, and it could basically enforce those conditional access policies, but at the network layer. … So, it’s multifactor with numbers matching plus compliant device, plus being enrolled in our CrowdStrike system with full enforcement. And so, if all of those things don’t match, you’re not getting in. It’s the perfect symbiosis of all of those things.”
Zero Trust initiatives. For interviewees whose organizations were in the process of integrating Zero Trust principles into their environments, AppGate ZTNA was noted as an enabling factor.
Agentic AI enablement. Interviewees indicated that AppGate facilitated ongoing collaboration and feature development aligned with their organizational needs, enabling more responsive support and integration of emerging technologies like agentic AI workloads and systems.
Flexibility would also be quantified when evaluated as part of a specific project (described in more detail in Total Economic Impact Approach).
| Ref. | Cost | Initial | Year 1 | Year 2 | Year 3 | Total | Present Value |
|---|---|---|---|---|---|---|---|
| Gtr | AppGate ZTNA | $0 | $2,200,000 | $2,200,000 | $2,200,000 | $6,600,000 | $5,471,074 |
| Htr | Deployment and management | $18,216 | $16,698 | $15,939 | $15,787 | $66,640 | $58,430 |
| Total costs (risk-adjusted) | $18,216 | $2,216,698 | $2,215,939 | $2,215,787 | $6,666,640 | $5,529,504 |
Evidence and data. Interviewees described how their organizations’ respective AppGate ZTNA costs were configured on a per-user per-month basis. Total number of sites and IP addresses were noted as additional cost drivers.
The cybersecurity manager in the manufacturing industry stated: “They never charged us a dime [to scale up]. We pay for the licenses and then they do whatever it takes to make us successful. It’s amazing. They’re fantastic.”
Pricing may vary. Contact AppGate for additional details.
Modeling and assumptions. Based on the interviews, Forrester assumes the composite organization licenses 25,000 users per month.
Risks. The following risks may impact this cost:
The number of AppGate features deployed.
The size, coverage, and adoption of AppGate ZTNA deployment.
Results. To account for these risks, Forrester adjusted this cost upward by 10%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $5.5 million.
| Ref. | Metric | Source | Initial | Year 1 | Year 2 | Year 3 |
|---|---|---|---|---|---|---|
| G1 | Total users | Composite | 0 | 25,000 | 25,000 | 25,000 |
| G2 | Cost per user | Interviews | 0 | $80 | $80 | $80 |
| Gt | AppGate ZTNA | G1*G2 | $0 | $2,000,000 | $2,000,000 | $2,000,000 |
| Risk adjustment | ↑10% | |||||
| Gtr | AppGate ZTNA (risk-adjusted) | $0 | $2,200,000 | $2,200,000 | $2,200,000 | |
| Three-year total: $6,600,000 | Three-year present value: $5,471,074 | |||||
Evidence and data. Interviewees’ organizations across industries successfully deployed AppGate with limited resources, rapidly onboarding thousands of users and applications through strong internal execution and responsive vendor support. Once deployed, AppGate required minimal ongoing management with small teams handling maintenance through largely automated processes.
Deployment. The interviewees’ organizations deployed AppGate with limited resources, onboarding users and applications. Interviewees also noted receiving highly responsive support from the AppGate team.
Management. Interviewees emphasized that AppGate required minimal ongoing effort to manage, with small teams and largely automated processes handling policy updates and access entitlements.
The cybersecurity manager in the manufacturing industry indicated that the minimal ongoing labor costs was a primary selling point for their organization’s investment in AppGate: “Now that we’re fully deployed and we’ve been there for a while, maybe one-tenth of one FTE is dedicated to the maintenance and management of AppGate. It’s not much.”
Modeling and assumptions. Based on the interviews, Forrester assumes the following about the composite organization:
The composite organization dedicates 240 IT resource hours within a five-week period to stand up its AppGate ZTNA environment.
The composite organization dedicates approximately one-tenth of one FTE to managing the AppGate ZTNA environment over the three year-period, with slight management efficiencies gained year over year as administration workflows mature and reach a steady state.
The fully burdened hourly rate for a technical resource is $69.
Risks. The following risks may impact this cost:
The size, scope, and complexity of deployment and legacy environment.
Prevailing labor rates, internal skill sets, and training requirements for IT resources and end users.
Implementation requirements, organizational priorities, and change management efforts.
Results. To account for these risks, Forrester adjusted this cost upward by 10%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $58,000.
Ongoing management costs for the composite organization
| Ref. | Metric | Source | Initial | Year 1 | Year 2 | Year 3 |
|---|---|---|---|---|---|---|
| H1 | Total time necessary for AppGate deployment (hours) | Interviews | 240 | 0 | 0 | 0 |
| H2 | Total time of ongoing AppGate administration (hours) | Interviews | 0 | 220 | 210 | 208 |
| H3 | Fully burdened hourly rate for a technical resource | Composite | $69 | $69 | $69 | $69 |
| Ht | Deployment and management | (H1+H2)*H3 | $16,560 | $15,180 | $14,490 | $14,352 |
| Risk adjustment | ↑10% | |||||
| Htr | Deployment and management (risk-adjusted) | $18,216 | $16,698 | $15,939 | $15,787 | |
| Three-year total: $66,640 | Three-year present value: $58,430 | |||||
| Initial | Year 1 | Year 2 | Year 3 | Total | Present Value | |
|---|---|---|---|---|---|---|
| Total costs | ($18,216) | ($2,216,698) | ($2,215,939) | ($2,215,787) | ($6,666,640) | ($5,529,504) |
| Total benefits | $0 | $6,884,341 | $6,884,341 | $6,884,341 | $20,653,023 | $17,120,337 |
| Net benefits | ($18,216) | $4,667,643 | $4,668,402 | $4,668,554 | $13,986,383 | $11,590,833 |
| ROI | 210% | |||||
| Payback | <6 months |
The financial results calculated in the Benefits and Costs sections can be used to determine the ROI, NPV, and payback period for the composite organization’s investment. Forrester assumes a yearly discount rate of 10% for this analysis.
These risk-adjusted ROI, NPV, and payback period values are determined by applying risk-adjustment factors to the unadjusted results in each Benefit and Cost section.
The initial investment column contains costs incurred at “time 0” or at the beginning of Year 1 that are not discounted. All other cash flows are discounted using the discount rate at the end of the year. PV calculations are calculated for each total cost and benefit estimate. NPV calculations in the summary tables are the sum of the initial investment and the discounted cash flows in each year. Sums and present value calculations of the Total Benefits, Total Costs, and Cash Flow tables may not exactly add up, as some rounding may occur.
From the information provided in the interviews, Forrester constructed a Total Economic Impact™ framework for those organizations considering an investment in ZTNA.
The objective of the framework is to identify the cost, benefit, flexibility, and risk factors that affect the investment decision. Forrester took a multistep approach to evaluate the impact that ZTNA can have on an organization.
Interviewed AppGate stakeholders and Forrester analysts to gather data relative to ZTNA.
Interviewed four decision-makers at organizations using ZTNA to obtain data about costs, benefits, and risks.
Designed a composite organization based on characteristics of the interviewees’ organizations.
Constructed a financial model representative of the interviews using the TEI methodology and risk-adjusted the financial model based on issues and concerns of the interviewees.
Employed four fundamental elements of TEI in modeling the investment impact: benefits, costs, flexibility, and risks. Given the increasing sophistication of ROI analyses related to IT investments, Forrester’s TEI methodology provides a complete picture of the total economic impact of purchase decisions. Please see Appendix A for additional information on the TEI methodology.
Benefits represent the value the solution delivers to the business. The TEI methodology places equal weight on the measure of benefits and costs, allowing for a full examination of the solution’s effect on the entire organization.
Costs comprise all expenses necessary to deliver the proposed value, or benefits, of the solution. The methodology captures implementation and ongoing costs associated with the solution.
Flexibility represents the strategic value that can be obtained for some future additional investment building on top of the initial investment already made. The ability to capture that benefit has a PV that can be estimated.
Risks measure the uncertainty of benefit and cost estimates given: 1) the likelihood that estimates will meet original projections and 2) the likelihood that estimates will be tracked over time. TEI risk factors are based on “triangular distribution.”
The present or current value of (discounted) cost and benefit estimates given at an interest rate (the discount rate). The PV of costs and benefits feed into the total NPV of cash flows.
The present or current value of (discounted) future net cash flows given an interest rate (the discount rate). A positive project NPV normally indicates that the investment should be made unless other projects have higher NPVs.
A project’s expected return in percentage terms. ROI is calculated by dividing net benefits (benefits less costs) by costs.
The interest rate used in cash flow analysis to take into account the time value of money. Organizations typically use discount rates between 8% and 16%.
The breakeven point for an investment. This is the point in time at which net benefits (benefits minus costs) equal initial investment or cost.
Total Economic Impact is a methodology developed by Forrester Research that enhances a company’s technology decision-making processes and assists solution providers in communicating their value proposition to clients. The TEI methodology helps companies demonstrate, justify, and realize the tangible value of business and technology initiatives to both senior management and other key stakeholders.
1 Source: Global Cybersecurity Market Forecast, 2024 To 2029, Forrester Research, Inc., September 9, 2025.
2 Total Economic Impact is a methodology developed by Forrester Research that enhances a company’s technology decision-making processes and assists solution providers in communicating their value proposition to clients. The TEI methodology helps companies demonstrate, justify, and realize the tangible value of business and technology initiatives to both senior management and other key stakeholders.
3 Cumulative breach costs are computed using the composite organization’s size (revenue or number of employees) as an input to a regression analysis of reported total cumulative costs for all breaches for organizations that experienced at least one breach in the past 12 months. Source: Forrester’s Security Survey, 2025, “Using your best estimate, what was the total cumulative cost of all breaches experienced by your organization in the past 12 months?” Base: 1,740 global security decision-makers who have experienced a breach in the past 12 months. The cumulative breach cost is then multiplied by a 67% likelihood for organizations to experience one or more breaches in a given year. Source: Forrester’s Security Survey, 2025, “How many times do you estimate that your organization’s sensitive data was potentially compromised or breached in the past 12 months?” Base: 2,643 global security decision-makers. Regression analysis of the reported total cumulative costs of all breaches experienced by security decision-makers' organizations in the past 12 months. The composite organization's revenue is used as the input to the regression formula. Source: Forrester's Security Survey, 2024, "Using your best estimate, what was the total cumulative cost of all breaches experienced by your organization in the past 12 months?" Base: 1,660 global security decision-makers who have experienced a breach in the past 12 months.
4 Regression analysis of the likelihood of experiencing one or more breaches, using the frequency that organizations experienced breaches in the past 12 months as reported by security decision-makers. The composite organization’s revenue is used as the input to the regression formula. Source: Forrester’s Security Survey, 2025, “How many times do you estimate that your organization’s sensitive data was potentially compromised or breached in the past 12 months?” Base: 2,643 global security decision-makers
5 Percentage of breaches by primary attack vector, as reported by security decision-makers whose organizations experienced at least one breach in the last 12 months. Source: Forrester’s Security Survey, 2025, “Of the times that your organization’s sensitive data was potentially compromised or breached in the past 12 months, please indicate how many of each fall into the categories below.” Base: 1,766 global security decision-makers who have experienced a breach in the past 12 months.
Readers should be aware of the following:
This study is commissioned by AppGate and delivered by Forrester Consulting. It is not meant to be used as a competitive analysis.
Forrester makes no assumptions as to the potential ROI that other organizations will receive. Forrester strongly advises that readers use their own estimates within the framework provided in the study to determine the appropriateness of an investment in ZTNA. For any interactive functionality, the intent is for the questions to solicit inputs specific to a prospect’s business. Forrester believes that this analysis is representative of what companies may achieve with ZTNA based on the inputs provided and any assumptions made. Forrester does not endorse AppGate or its offerings. Although great care has been taken to ensure the accuracy and completeness of this model, AppGate and Forrester Research are unable to accept any legal responsibility for any actions taken on the basis of the information contained herein. The interactive tool is provided ‘AS IS,’ and Forrester and AppGate make no warranties of any kind.
AppGate reviewed and provided feedback to Forrester, but Forrester maintains editorial control over the study and its findings and does not accept changes to the study that contradict Forrester’s findings or obscure the meaning of the study.
AppGate provided the customer names for the interviews but did not participate in the interviews.
Courtenay O’Connor
Alyssa Dolan
November 2025
https://mainstayadvisor.com/go/mainstay/gdpr/policy.html